List of questions
Related questions
Question 245 - PT0-002 discussion
A penetration tester discovered that a client uses cloud mail as the company's email system. During the penetration test, the tester set up a fake cloud mail login page and sent all company employees an email that stated their inboxes were full and directed them to the fake login page to remedy the issue. Which of the following BEST describes this attack?
A.
Credential harvesting
B.
Privilege escalation
C.
Password spraying
D.
Domain record abuse
Your answer:
0 comments
Sorted by
Leave a comment first